Classifying Malware Using Tensor Decomposition
Tensor decomposition is a powerful unsupervised machine learning technique capable of
modeling multidimensional data, including that related to malware. This chapter discusses a …
modeling multidimensional data, including that related to malware. This chapter discusses a …
[HTML][HTML] Continual Semi-Supervised Malware Detection
M Chin, R Corizzo - Machine Learning and Knowledge Extraction, 2024 - mdpi.com
Detecting malware has become extremely important with the increasing exposure of
computational systems and mobile devices to online services. However, the rapidly evolving …
computational systems and mobile devices to online services. However, the rapidly evolving …
SS-MVMETRO: Semi-supervised multi-view human mesh recovery transformer
S Sheng, T Zheng, Z Ren, Y Zhang, W Fu - Applied Intelligence, 2024 - Springer
Parametric methods are widely utilized in RGB-based human mesh recovery, relying on
precise statistical human body model parameters that are challenging to obtain. In contrast …
precise statistical human body model parameters that are challenging to obtain. In contrast …
Catch'em all: Classification of Rare, Prominent, and Novel Malware Families
National security is threatened by malware, which remains one of the most dangerous and
costly cyber threats. As of last year, researchers reported 1.3 billion known malware …
costly cyber threats. As of last year, researchers reported 1.3 billion known malware …
Binary Bleed: Fast Distributed and Parallel Method for Automatic Model Selection
In several Machine Learning (ML) clustering and dimensionality reduction approaches, such
as non-negative matrix factorization (NMF), RESCAL, and K-Means clustering, users must …
as non-negative matrix factorization (NMF), RESCAL, and K-Means clustering, users must …
Electrical Grid Anomaly Detection via Tensor Decomposition
Supervisory Control and Data Acquisition (SCADA) systems often serve as the nervous
system for substations within power grids. These systems facilitate real-time monitoring, data …
system for substations within power grids. These systems facilitate real-time monitoring, data …
Advanced Semi-Supervised Tensor Decomposition Methods for Malware Characterization
ME Eren - 2024 - search.proquest.com
Malware continues to be one of the most dangerous and costly cyber threats to national
security. As of last year, over 1.3 billion malware specimens have been documented …
security. As of last year, over 1.3 billion malware specimens have been documented …
[PDF][PDF] A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS)
NHF Beebe - 2024 - netlib.sandia.gov
A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Page 1 A
Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Nelson HF …
Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Nelson HF …